| [Japanese] | 
| JVNDB-2023-000051 | 
| Multiple vulnerabilities in T&D and ESPEC MIC data logger products | 
|
| 
 
Multiple data logger products provided by T&D Corporation and ESPEC MIC CORP. contain multiple vulnerabilities listed below. 
 * Client-side enforcement of server-side security (CWE-602) - CVE-2023-22654
 * Improper authentication (CWE-287) - CVE-2023-27388
 * Missing authentication for critical function (CWE-306) - CVE-2023-23545
 * Cross-site request forgery (CWE-352) - CVE-2023-27387
 
 CVE-2023-22654
 Takaya Noma, Tomoya Inazawa, Yudai Morii, Junnosuke Kushibiki, Takayuki Sasaki and Katsunari Yoshioka of Yokohama National University reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
 
 CVE-2023-27388
 Tomoya Inazawa, Takaya Noma, Yudai Morii, Junnosuke Kushibiki, Takayuki Sasaki and Katsunari Yoshioka of Yokohama National University reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
 
 CVE-2023-23545
 Yudai Morii, Takaya Noma, Tomoya Inazawa, Junnosuke Kushibiki, Takayuki Sasaki and Katsunari Yoshioka of Yokohama National University reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
 
 CVE-2023-27387
 Junnosuke Kushibiki, Takaya Noma, Tomoya Inazawa, Yudai Morii, Takayuki Sasaki and Katsunari Yoshioka of Yokohama National University reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
 | 
|
| 
 
  CVSS V3 Severity:Base Metrics 9.8 (Critical) [IPA Score]
 
    Attack Vector: NetworkAttack Complexity: LowPrivileges Required: NoneUser Interaction: NoneScope: UnchangedConfidentiality Impact: HighIntegrity Impact: HighAvailability Impact: High 
  CVSS V2 Severity:Base Metrics 7.5 (High) [IPA Score]
 
    Access Vector: NetworkAccess Complexity: LowAuthentication: NoneConfidentiality Impact: PartialIntegrity Impact: PartialAvailability Impact: Partial 
  
The above CVSS base scores have been assigned for CVE-2023-27388
 | 
| 
 
  CVSS V3 Severity:Base Metrics
4.2 (Medium) [IPA Score]
 
Attack Vector: Network
Attack Complexity: High
Privileges Required: Low
User Interaction: None
Scope: Unchanged
Confidentiality Impact: Low
Integrity Impact: Low
Availability Impact: None CVSS V2 Severity:Base Metrics 
2.1 (Low) 
[IPA Score]
Access Vector: Network
Access Complexity: High
Authentication: Single
Confidentiality Impact: None
Integrity Impact: Partial
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2023-22654
 | 
| 
 
  CVSS V3 Severity:Base Metrics
5.3 (Medium) [IPA Score]
 
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: None
Scope: Unchanged
Confidentiality Impact: None
Integrity Impact: Low
Availability Impact: None CVSS V2 Severity:Base Metrics 
5.0 (Medium) 
[IPA Score]
Access Vector: Network
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: Partial
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2023-23545
 | 
| 
 
  CVSS V3 Severity:Base Metrics
4.3 (Medium) [IPA Score]
 
Attack Vector: Network
Attack Complexity: Low
Privileges Required: None
User Interaction: Required
Scope: Unchanged
Confidentiality Impact: None
Integrity Impact: Low
Availability Impact: None CVSS V2 Severity:Base Metrics 
2.6 (Low) 
[IPA Score]
Access Vector: Network
Access Complexity: High
Authentication: None
Confidentiality Impact: None
Integrity Impact: Partial
Availability Impact: None
The above CVSS base scores have been assigned for CVE-2023-27387
 | 
|
| 
 
	
 | 
| 
 
	ESPEC MIC Corp.
	
		T&D CorporationRS-12N all firmware versionsRT-12N all firmware versionsRT-22BN all firmware versionsTEU-12N all firmware versions 
		RTR-5W all firmware versionsTR-71W all firmware versionsTR-72W all firmware versionsWDR-3 all firmware versionsWDR-7 all firmware versionsWS-2 all firmware versions | 
| 
 
	
 | 
|
| 
 
  * An arbitrary script may be executed on a logged-in user's web browser - CVE-2023-22654* An attacker who can access the product may login to the product as a registered user - CVE-2023-27388
 * An attacker who can access the product may alter the product settings without authentication - CVE-2023-23545
 * If a user views a malicious page while logged in, unintended operations may be performed - CVE-2023-27387
 
 | 
|
| 
 
[Stop using the product]The developers state that these products had been end of sale in 2014, therefore recommend users to stop using the products.
 
 Until stop using the products, it is recommended that applying following mitigations.
 
 
 Connect the products to the trusted closed network
 Allow only trusted PCs to access the products
 Install a WAF to protect the products
 Apart from the vulnerabilities, the developers released updates with improved security features for the following products.
 
 
 T&D Corporation's products
 
 ESPEC MIC CORP.'s products
 
 For more details, refer to the information provided by the developers.
 | 
|
| 
 
	ESPEC MIC Corp.
	
	T&D Corporation
	
 | 
|
| 
 
	Improper Authentication(CWE-287) [IPA Evaluation]Cross-Site Request Forgery(CWE-352) [IPA Evaluation]No Mapping(CWE-Other) [IPA Evaluation] | 
|
| 
 
	CVE-2023-23545 CVE-2023-22654 CVE-2023-27387 CVE-2023-27388  | 
|
| 
 
	JVN : JVN#14778242 National Vulnerability Database (NVD) : CVE-2023-22654 National Vulnerability Database (NVD) : CVE-2023-23545 National Vulnerability Database (NVD) : CVE-2023-27387 National Vulnerability Database (NVD) : CVE-2023-27388  | 
|
| 
 
	[2023/05/19]Web page was published
[2024/05/23]References : Contents were added
 
 
 |